30 Best CEOs of the Year 2020 30 Best CEOs of the Year 2020 | Page 51

“ CyberX isn’t just a business” for us; it represents a moral obligation to do what we do best. We’re here because we want to be. And that makes all the difference in the world.” builds a network topology diagram, using the Purdue Model, showing how all devices are connected to each other as well as any connections to IT networks. Devices can be highlighted on the map (or filtered) based on tags including protocols used, polling intervals, standard ports, and subnets. Risk & Vulnerability Management As the most complete industrial cybersecurity platform, the CyberX platform is able to analyze any IoT and ICS environment and return an objective risk score. That’s why CyberX’s Vulnerability Assessment report has quickly become the industry standard that boards of directors, internal auditors, regulators, and other overseers are looking for. Threat Monitoring & Detection CyberX uses 5 separate yet integrated analytics engines to immediately detect both zero-day and known threats in real-time. Behavioral Anomalies: CyberX uses an innovative, patented technology called Industrial Finite-State Modeling (IFSM) to quickly spot baseline deviations by modeling ICS networks as deterministic sequences of states and transitions. Protocol Violations: indicating the use of packet structures and field values that violate ICS protocol specifications as defined by IoT and ICS vendors. These indicate potential misuse of the IoT and ICS protocol to exploit device or network vulnerabilities. Industrial Malware: Behaviors indicating the presence of known malware such as WannaCry and NotPetya as well as purpose-built IoT and ICS malware such as TRITON and Industroyer. Machine-To-Machine (M2m) Communications: It is identified via ICS-aware heuristics such as PLCs should not typically be communicating with other PLCs. Operational Issues: It uses intermittent connectivity indicating early signs of equipment failure. Soc Integration CyberX reduces complexity and eliminates IT/OT silos by integrating out-of-the-box with your existing SOC workflows and security stack. Centralized Management CyberX’s scalable architecture enables centralized visibility and control across multiple tiers in the organization, giving you a single unified view of IoT and ICS risk across all their sites worldwide. SR The driving force behind the robust glory of CyberX Omer Schneider is the Co-founder and also serves as the Chief Executive Officer of CyberX. Prior to co- founding CyberX, Mr. Omer Schneider led a blue team cybersecurity unit tasked with protecting critical national infrastructure, where he headed day- to-day cybersecurity operations and managed the development and acquisition of security technologies across all layers of the security stack. He was also invited to be a member of his country’s national cybersecurity initiative and is a contributing member of the Industrial Internet Consortium (IIC). Omer holds a BSc. in Computer Engineering from the Technion Institute and an MBA degree from Tel Aviv University Business School.